SQL injection hacks

Unanswered Question
Sep 1st, 2008
User Badges:


i am a bit disappointed by the ability of cisco IPS to block sql injections, even with the new added generic sql injection signatures not long ago, still websites hosted with us are being hacked.

i know its vulnerabilities in the sites, but the command update is a lot used to hack sites, i have created a custom signature that catches "update" in small and caps, but i was surprised yesterday that the hacker used "u%pdate" and it bypassed the sensor !!

any thoughts on the subject


  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
mhellman Tue, 09/02/2008 - 06:00
User Badges:
  • Blue, 1500 points or more

Interesting. I'm so not a SQL expert, but I don't see how "u%pdate" is valid SQL. Why would the database interpret "u%pdate" as valid SQL? Is the application cleaning up the input before passing to the db?

IMHO, if your customers have vulnerable apps, then they need to fix them. A network based IDS simply isn't going to be the best at detecting every possible variation of injection (or anything else imo, but that's a whole different soap box). It just doesn't have the required context. Throw TLS into the mix, and most of the time coverage drops to zero.

josephium Tue, 09/02/2008 - 21:14
User Badges:

well we are still investigating how "u%pdate" was interpreted to be a valid SQL statement, but i have to emphasize again that the cisco IPS is quite behind in signatures regarding sql injection, i was just checking Tippingpoint yesterday and it has more than 25 signatures on sql injection, it has a signature for each sql command, update, select ...

the cisco IPS engineers should really know this don't you think ?

mhellman Wed, 09/03/2008 - 05:14
User Badges:
  • Blue, 1500 points or more

I agree. now they do;-)


This Discussion